CN101084506A - 数据处理设备及操作这种数据处理设备的方法 - Google Patents

数据处理设备及操作这种数据处理设备的方法 Download PDF

Info

Publication number
CN101084506A
CN101084506A CNA2005800439041A CN200580043904A CN101084506A CN 101084506 A CN101084506 A CN 101084506A CN A2005800439041 A CNA2005800439041 A CN A2005800439041A CN 200580043904 A CN200580043904 A CN 200580043904A CN 101084506 A CN101084506 A CN 101084506A
Authority
CN
China
Prior art keywords
data processing
original
specially
processing equipment
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2005800439041A
Other languages
English (en)
Chinese (zh)
Inventor
马蒂亚斯·瓦格纳
瓦格纳·福伊泽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Publication of CN101084506A publication Critical patent/CN101084506A/zh
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/127Trusted platform modules [TPM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
CNA2005800439041A 2004-12-20 2005-12-12 数据处理设备及操作这种数据处理设备的方法 Pending CN101084506A (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP04106722.4 2004-12-20
EP04106722 2004-12-20

Publications (1)

Publication Number Publication Date
CN101084506A true CN101084506A (zh) 2007-12-05

Family

ID=36130124

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2005800439041A Pending CN101084506A (zh) 2004-12-20 2005-12-12 数据处理设备及操作这种数据处理设备的方法

Country Status (5)

Country Link
US (1) US20120005466A1 (de)
EP (1) EP1831812A1 (de)
JP (1) JP2008524901A (de)
CN (1) CN101084506A (de)
WO (1) WO2006067665A1 (de)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679008A (zh) * 2012-09-03 2014-03-26 江苏东大集成电路系统工程技术有限公司 一种高效的安全芯片功耗攻击测试方法

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9336160B2 (en) * 2008-10-30 2016-05-10 Qualcomm Incorporated Low latency block cipher
JP4687775B2 (ja) * 2008-11-20 2011-05-25 ソニー株式会社 暗号処理装置
US8413906B2 (en) 2011-05-22 2013-04-09 King Saud University Countermeasures to secure smart cards
US9410996B2 (en) * 2013-06-03 2016-08-09 Eaton Corporation Method and system employing finite state machine modeling to identify one of a plurality of different electric load types
WO2017058947A1 (en) 2015-09-28 2017-04-06 Red Balloon Security, Inc. Injectable hardware and software attestation of sensory input data
US10255462B2 (en) * 2016-06-17 2019-04-09 Arm Limited Apparatus and method for obfuscating power consumption of a processor
US11188682B2 (en) * 2016-06-17 2021-11-30 Arm Limited Apparatus and method for masking power consumption of a processor
US10200192B2 (en) * 2017-04-19 2019-02-05 Seagate Technology Llc Secure execution environment clock frequency hopping
CN107223322B (zh) * 2017-04-25 2020-07-24 深圳市汇顶科技股份有限公司 签名验证的方法、设备和系统
CN111352833B (zh) * 2020-02-24 2023-04-25 北京百度网讯科技有限公司 推荐系统的测试方法、装置、设备和计算机存储介质
US11599679B2 (en) * 2020-06-23 2023-03-07 Arm Limited Electromagnetic and power noise injection for hardware operation concealment

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2280502B1 (de) 1998-06-03 2018-05-02 Cryptography Research, Inc. Verwenden von unvorhersehbaren Informationen zu widerstehen die Entdeckung von Geheimnissen durch externe Überwachung
WO1999067766A2 (en) 1998-06-03 1999-12-29 Cryptography Research, Inc. Balanced cryptographic computational method and apparatus for leak minimization in smartcards and other cryptosystems
CA2333095C (en) 1998-06-03 2005-05-10 Cryptography Research, Inc. Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems
EP1068668B1 (de) 1998-09-30 2005-10-05 Koninklijke Philips Electronics N.V. Schaltungsanordnung zum verarbeiten von datensignalen
WO2000019386A1 (de) 1998-09-30 2000-04-06 Koninklijke Philips Electronics N.V. Datenverarbeitungseinrichtung und verfahren zu dessen betrieb zum verhindern einer differentiellen stromverbrauchanalyse
DE19845073C2 (de) * 1998-09-30 2001-08-30 Infineon Technologies Ag Verfahren zur Absicherung der DES-Verschlüsselung gegen Ausspähung der Schlüssel durch Analyse der Stromaufnahme des Prozessors
US6320770B1 (en) 1998-09-30 2001-11-20 U.S. Philips Corporation Data processing device and method for the voltage supply of same
WO2000019367A1 (de) 1998-09-30 2000-04-06 Koninklijke Philips Electronics N.V. Datenverarbeitungseinrichtung und verfahren zu dessen betrieb zum verhindern einer differentiellen stromverbrauchanalyse
WO2000019385A1 (en) 1998-09-30 2000-04-06 Koninklijke Philips Electronics N.V. Data carrier device with data bus means whose power consumption is independent of data transmitted via the data bus means
DE19850293A1 (de) 1998-10-30 2000-05-04 Koninkl Philips Electronics Nv Datenträger mit Kompromittierungsschutz
DE19850721A1 (de) 1998-11-03 2000-05-18 Koninkl Philips Electronics Nv Datenträger mit Verschleierung des Stromverbrauchs
GB2345229B (en) * 1998-12-23 2003-12-03 Motorola Ltd Method for encrypting data
FR2790347B1 (fr) * 1999-02-25 2001-10-05 St Microelectronics Sa Procede de securisation d'un enchainement d'operations realisees par un circuit electronique dans le cadre de l'execution d'un algorithme
CN1175570C (zh) 1999-05-12 2004-11-10 因芬尼昂技术股份公司 用于在集成电路的供电电流中产生电流脉冲的电路装置
US6419159B1 (en) 1999-06-14 2002-07-16 Microsoft Corporation Integrated circuit device with power analysis protection circuitry
ATE364272T1 (de) * 1999-11-03 2007-06-15 Infineon Technologies Ag Kodiervorrichtung
DE10000503A1 (de) * 2000-01-08 2001-07-12 Philips Corp Intellectual Pty Datenverarbeitungseinrichtung und Verfahren zu dessen Betrieb
WO2001093192A1 (en) 2000-05-31 2001-12-06 Koninklijke Philips Electronics N.V. Data carrier for the adaptation of a consumption time interval to the power consumption of the data carrier
US6625737B1 (en) 2000-09-20 2003-09-23 Mips Technologies Inc. System for prediction and control of power consumption in digital system
JP2003018143A (ja) 2001-06-28 2003-01-17 Mitsubishi Electric Corp 情報処理装置
JP2006524387A (ja) * 2003-04-22 2006-10-26 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 暗号アプリケーションに対する電子回路装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679008A (zh) * 2012-09-03 2014-03-26 江苏东大集成电路系统工程技术有限公司 一种高效的安全芯片功耗攻击测试方法
CN103679008B (zh) * 2012-09-03 2018-08-17 江苏东大集成电路系统工程技术有限公司 一种高效的安全芯片功耗攻击测试方法

Also Published As

Publication number Publication date
EP1831812A1 (de) 2007-09-12
WO2006067665A1 (en) 2006-06-29
US20120005466A1 (en) 2012-01-05
JP2008524901A (ja) 2008-07-10

Similar Documents

Publication Publication Date Title
CN101084506A (zh) 数据处理设备及操作这种数据处理设备的方法
Chen et al. An efficient image encryption scheme using lookup table-based confusion and diffusion
Wong et al. An efficient diffusion approach for chaos-based image encryption
US8369516B2 (en) Encryption apparatus having common key encryption function and embedded apparatus
JP5776113B2 (ja) 高次の観測攻撃から保護される暗号回路
JP5700128B2 (ja) 暗号化処理装置および認証方法
US7659837B2 (en) Operation processing apparatus, operation processing control method, and computer program
CN101739889B (zh) 密码处理装置
CN1989726A (zh) 用于执行加密计算的方法和装置
CN102970132B (zh) 一种防止对分组算法进行功耗分析和电磁辐射分析的防护方法
CN103795527A (zh) 防止基于功耗分析攻击aes算法的软件掩码防护方案
EP3371928A1 (de) Schlüsselsequenzgenerierung für kryptographische operationen
KR100737171B1 (ko) 아리아에 대한 전력분석공격에 대응하는 저메모리형 마스킹방법
CN104301095A (zh) Des轮运算方法和电路
Huang et al. Low area-overhead low-entropy masking scheme (LEMS) against correlation power analysis attack
Saha et al. White-box cryptography based data encryption-decryption scheme for iot environment
KR20190049875A (ko) 테이블 기반 구현에서의 차수 2 이상의 dca 공격에 대응하는 방법
Ledda et al. Enhancing IDEA algorithm using circular shift and middle square method
Yoshikawa et al. Efficient random number for the masking method against DPA attacks
Karri et al. Parity-based concurrent error detection in symmetric block ciphers
Sun et al. A lightweight secure protocol for wireless sensor networks
Fu et al. Medical image protection using hyperchaos-based encryption
Gomathisankaran et al. Glitch resistant private circuits design using HORNS
Goodwin et al. Advanced encryption standard (AES) implementation with increased DPA resistance and low overhead
Hars Information Security Applications of Bit-Mixers

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: NXP CO., LTD.

Free format text: FORMER OWNER: KONINKLIJKE PHILIPS ELECTRONICS N.V.

Effective date: 20080418

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20080418

Address after: Holland Ian Deho Finn

Applicant after: Koninkl Philips Electronics NV

Address before: Holland Ian Deho Finn

Applicant before: Koninklijke Philips Electronics N.V.

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20071205